eCourses are individual online courses from renowned presenters at our live conferences. Learn via audio or video, receive the supporting materials, and fulfill MCLE requirements at your convenience with the best content available!
These courses are CLE accredited in Texas and California, with some accredited in Oklahoma.
If you need credit for an eCourse in other states please read through the disclaimerbefore purchasing an eCourse to make sure you will be able to self-report your MCLE credit after completion of the eCourse
Survey the current cyber threat landscape and explore ways to manage the related risks. Gain a view from the front lines of recent attacks along with tips on how to mitigate the risks and manage a crisis should a company become a victim. more »
Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures. more »
From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations). more »
The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement. more »
HIPAA's Breach Notification Rule requires notification of patients, the Office for Civil Rights, and sometimes the media, following a breach of unsecured protected health information. Through case studies, examine challenging issues in breach reporting. more »
Session 1: Internal Controls and Compliance - Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.
Session 2: Incident Response and Breach Disclosure - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators. more »
Cybersecurity is a realm that often conflates myth with reality, thereby obscuring certain threats and causing overreaction to others. A key to developing a sophisticated approach to cybersecurity is to dispel these fundamental myths that often cause organizations to incorrectly assess threats or misallocate resources. more »
Session 1: Advanced Licensing - With more and more companies monetizing their intellectual property through licensing arrangements and other forms of technology transactions, courts continue to develop licensing law and contract principles at an ever-increasing pace. Review important key agreement clauses in light of recent developments, with an emphasis on practical drafting and negotiating strategies.
Session 2: Open Source and Community License Enforcement - Enforcement of open source licenses via copyright infringement actions, in the US and abroad, is common. Learn about community efforts to reign in copyright trolls and gain a better understanding of current trolling activity. more »
Session 1: Special Considerations for the Business Data Breach - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and your brand. Explore developments in incident response and hear practical guidance for managing and insuring against risk while satisfying legal obligations when the inevitable breach occurs.
Session 2: Cybersecurity: In-House Counsel Challenges and Perspectives - A conversation with in-house counsel discussing salient and trending topics in cybersecurity, including balancing employee privacy and effective cyber defense, finding the “right” level of supplier cybersecurity diligence, and recommended practices for implementing data security governance. more »
Session 1: Cybersecurity Update, Part I: Risk & Liability - We all know that information and data can be breached, but what are the risks when that happens? Listen to a discussion about what you, as a firm and/or attorney, are liable for and what the liabilities are for vendors.
Session 2: Cybersecurity Update, Part II: Crisis Management - Explore issues related to crisis management and how to respond to network intrusions, data loss, data breach, and cyber disruption.
Session 3: Trade Secrets: A Practical Guide to Protecting Information In and Out of Court - Explore techniques for use before and during litigation to protect trade secret information critical to an organization’s success.
Cybersecurity intersects substantially with national security giving rise to complex questions of policy and law. Hear Professor Chesney map the terrain and review important recent developments. more »
Session 1: The Cyber Threat Landscape - When it always seems like the sky is falling in the cyber world, it’s hard to know what to actually worry about. Explore who the bad actors are, what they are after, and how the law fits in.
Session 2: Cyber Security Governance—Addressing Emerging Expectations - Explore the threat landscape as pertinent to an executive officer and/or board of directors, including the questions that should be asked in light of what applicable regulating bodies are expecting. Hear a discussion about how legal and industry requirements and guidance may be used to promote a cultural shift towards data protection, which has become increasingly important both in the US and abroad. more »
With cybercrimes dominating the news, how can you avoid making yourself an attractive or easy target? Hear from a former NSA intelligence officer with over 20 years of experience in information security and learn how to understand the mind of a hacker. more »